CRYPTOSYSTEM

作品数:104被引量:140H指数:6
导出分析报告
相关领域:自动化与计算机技术电子电信更多>>
相关机构:湖南大学中国科学技术大学昆明理工大学清华大学更多>>
相关期刊:更多>>
相关基金:国家自然科学基金国家重点基础研究发展计划中国博士后科学基金北京市自然科学基金更多>>
-

检索结果分析

结果分析中...
条 记 录,以下是1-10
视图:
排序:
Efficient Bit-Plane Based Medical Image Cryptosystem Using Novel and Robust Sine-Cosine Chaotic Map
《Computers, Materials & Continua》2025年第4期917-933,共17页Zeric Tabekoueng Njitacke Louai A.Maghrabi Musheer Ahmad Turki Althaqafi 
This paper presents a high-security medical image encryption method that leverages a novel and robust sine-cosine map.The map demonstrates remarkable chaotic dynamics over a wide range of parameters.We employ nonlinea...
关键词:Image cryptosystem robust chaos sine-cosine map nonlinear analysis tools medical images 
A lightweight symmetric image encryption cryptosystem in wavelet domain based on an improved sine map
《Chinese Physics B》2024年第3期266-276,共11页陈柏池 黄林青 蔡述庭 熊晓明 张慧 
Project supported by the Key Area Research and Development Program of Guangdong Province,China(Grant No.2022B0701180001);the National Natural Science Foundation of China(Grant No.61801127);the Science Technology Planning Project of Guangdong Province,China(Grant Nos.2019B010140002 and 2020B111110002);the Guangdong–Hong Kong–Macao Joint Innovation Field Project(Grant No.2021A0505080006).
In the era of big data,the number of images transmitted over the public channel increases exponentially.As a result,it is crucial to devise the efficient and highly secure encryption method to safeguard the sensitive ...
关键词:image encryption discrete wavelet transform 1D-chaotic system selective encryption Gaussianization operation 
A Privacy-preserving Energy Management System Based on Homomorphic Cryptosystem for IoT-enabled Active Distribution Network
《Journal of Modern Power Systems and Clean Energy》2024年第1期167-178,共12页Qian Hu Siqi Bu Wencong Su Vladimir Terzija 
supported by the National Natural Science Foundation of China(No.52077188);Guangdong Science and Technology Department(No.2019A1515011226);Hong Kong Research Grant Council(No.15219619).
Active distribution network(ADN),as a typically cyber-physical system,develops with the evolution of Internet of Things(IoTs),which makes the network vulnerable to cybersecurity threats.In this paper,the eavesdropping...
关键词:Eavesdropping attack energy management system homomorphic cryptosystem Internet of Things(IOTs) active distribution network(ADN) PRIVACY-PRESERVING 
An Efficient Heterogeneous Ring Signcryption Scheme for Wireless Body Area Networks
《Computer Systems Science & Engineering》2023年第11期2061-2078,共18页Qingqing Ning Chunhua Jin Zhiwei Chen Yongliang Xu Huaqi Lu 
supported by the Postgraduate Research&Practice Innovation Program of Jiangsu Province (Grant No.SJCX22_1677).
Wireless body area networks(WBANs)are an emerging technology for the real-time monitoring of physiological signals.WBANs provide a mechanism for collecting,storing,and transmitting physiological data to healthcare pro...
关键词:Wireless body area networks certificateless cryptosystem public key infrastructure SECURITY ring singncryption 
A Privacy-preserving Algorithm for AC Microgrid Cyber-physical System Against False Data Injection Attacks被引量:1
《Journal of Modern Power Systems and Clean Energy》2023年第5期1646-1658,共13页Jun Yang Yu Zhang 
supported in part by National Key R&D Program of China (No. 2018YFA0702200);in part by National Natural Science Foundation of China (No. 61773099)。
A new privacy-preserving algorithm based on the Paillier cryptosystem including a new cooperative control strategy is proposed in this paper, which can resist the false data injection(FDI) attack based on the finite-t...
关键词:AC microgrid cyber-physical system(CPS) distributed cooperative control false data injection(FDI)attack Paillier cryptosystem 
A Novel Internet of Medical Thing Cryptosystem Based on Jigsaw Transformation and Ikeda Chaotic Map
《Computer Systems Science & Engineering》2023年第9期3017-3036,共20页Sultan Almakdi Mohammed SAlshehri Yousef Asiri Mimonah Al Qathrady Anas Ibrar Jawad Ahmad 
The authors are thankful to the Deanship of Scientific Research at Najran University for funding this work under the Research Groups Funding program grant code(NU/RC/SERC/11/5).
Image encryption has attracted much interest as a robust security solution for preventing unauthorized access to critical image data.Medical picture encryption is a crucial step in many cloud-based and healthcare appl...
关键词:Jigsaw transformation CRYPTOSYSTEM image encryption medical images Ikeda map chaotic system 
Cryptanalysis of 2D-SCMCI Hyperchaotic Map Based Image Encryption Algorithm
《Computer Systems Science & Engineering》2023年第8期2401-2414,共14页Mohammed S.Alshehri Sultan Almakdi Mimonah Al Qathrady Jawad Ahmad 
The authors are thankful to the Deanship of Scientific Research at Najran University for funding this work under the Research Groups Funding program grant code(NU/RG/SERC/11/4).
Chaos-based cryptosystems are considered a secure mode of communication due to their reliability.Chaotic maps are associated with the other domains to construct robust encryption algorithms.There exist numerous encryp...
关键词:CRYPTANALYSIS hyperchaotic map image encryption chosen-plaintext attack CRYPTOSYSTEM 
VPFL:A verifiable privacy-preserving federated learning scheme for edge computing systems被引量:4
《Digital Communications and Networks》2023年第4期981-989,共9页Jiale Zhang Yue Liu Di Wu Shuai Lou Bing Chen Shui Yu 
supported by the National Natural Science Foundation of China(No.62206238);the Natural Science Foundation of Jiangsu Province(Grant No.BK20220562);the Natural Science Research Project of Universities in Jiangsu Province(No.22KJB520010).
Federated learning for edge computing is a promising solution in the data booming era,which leverages the computation ability of each edge device to train local models and only shares the model gradients to the centra...
关键词:Federated learning Edge computing PRIVACY-PRESERVING Verifiable aggregation Homomorphic cryptosystem 
A Low-Cost and High-Performance Cryptosystem Using Tripling-Oriented Elliptic Curve
《Intelligent Automation & Soft Computing》2023年第8期1807-1831,共25页Mohammad Alkhatib Wafa S.Aldalbahy 
Developing a high-performance public key cryptosystem is crucial for numerous modern security applications.The Elliptic Curve Cryptosystem(ECC)has performance and resource-saving advantages compared to other types of ...
关键词:Security CRYPTOGRAPHY elliptic curves software implement greatation MULTITHREADING 
Asymmetric Key Cryptosystem for Image Encryption by Elliptic Curve over Galois Field GF(2^(n))被引量:1
《Computers, Materials & Continua》2023年第8期2033-2060,共28页Mohammad Mazyad Hazzazi Hafeez Ur Rehman Tariq Shah Hajra Younas 
the deanship of Scientific research at King Khalid University for funding this work through the research group’s program under Grant Number R.G.P.2/5/44.
Protecting the integrity and secrecy of digital data transmitted through the internet is a growing problem.In this paper,we introduce an asymmetric key algorithm for specifically processing images with larger bit valu...
关键词:Elliptic curve Galois field group law hill cipher 
检索报告 对象比较 聚类工具 使用帮助 返回顶部